ISIS Suspect Was Sending Encrypted Emails

A senior Indian National Ivestigations Agency official said that accused had used tutanota.com, a secure encryption mail to be in touch with his handler abroad.

The National Investigation Agency (NIA) recently revealed that Ibrahim Yazdani, the Hyderabad youth arrested for his alleged links to Islamic State of Iraq and Syria, was sending encrypted emails to his Syria-based handler through a website that specialises in security and privacy of users. The probe agency further revealed details on purchases made by the other accused arrested by the agency recently.

A senior NIA official said that accused Ibrahim had used tutanota.com, a secure encryption mail to be in touch with his handler abroad. "The co-ordinates of places where logistics like weapons, urea etc. were to be delivered, were sent to him by his handler through this email, "said the officer. Developed by a German Company named Tutao Gmbh, Tutanota is an open-source end-to-end encrypted email software and hosts secure email service.

The agency suspects that Ibrahim was using the website to interact with Shafi Armar, who NIA believes to be the chief recruiter for NIA.Hyderbad resident, Ibrahim Yazdani, who was arrested by NIA along with four others including his brother Iliyas, is believed to be the alleged head of the ISIS module which had owed allegiance to Abu Bakr Baghdadi.

Ibrahim's younger brother, Iliyas, who was among the five arrested youth in Hyderabad had allegedly made some purchases before plans of carrying out terror attacks across the city. An NIA official told dna that Ilyas had purchased the weighing machine from a local shop at biwi bazar for weighing explosive precursors and chemicals.

While 30-year-old Ibrahim Yazdani, who is said to be a computer engineer by profession, his younger brother Iliyas is said to have dropped out of his graduation course and was working in Shalimar Online Seva, which is located close to the local police station in Talab Katta area of Hyderabad. Shalimar Online Seva, according to its online description, is like many private vendors used by the government to distribute pan cards, birth certificates and other identification documents.

The agency further said that Fahad, another arrested accused in the case, had procured nine Aircel pre-activated sims from promotional temporary stall at Charminar bus stop. "Subsequently he had purchased five Chinese mobile phones from a mobile shop at Charminar bus stop for use in their planning and operations, "said an official.

DNIndia: http://bit.ly/2bg3ABb

« Rio Olympics Hacking Threats
The Race To Regulate Self-Driving Cars »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Black Hat Briefings

Black Hat Briefings

The Black Hat Briefings are a series of highly technical information security conferences that bring together thought leaders from all facets of the infosec world.

Foundation for Strategic Research (FRS)

Foundation for Strategic Research (FRS)

The Foundation for Strategic Research is France's main independent think tank on strategic, defense and security issues. Cyber security is covered as part of the study areas.

Fortress Group

Fortress Group

Fortress is specialized in confidential and discrete recruitment solutions and temporary staffing in the field of security and risk management.

Post-Quantum

Post-Quantum

Post-Quantum offer a unique, patented quantum-resistant encryption algorithm that can be applied to existing products and networks.

Air Informatics

Air Informatics

Air Informatics LLC provides security, information management, analytics and informatics for IT and wirelessly enabled airplanes and operations.

DigitalXRaid

DigitalXRaid

DigitalXRAID is driven and motivated to ensure the bad guys don’t win. We’re dedicated to providing our clients with state-of-the-art cyber security solutions.

Secon Cyber Security

Secon Cyber Security

Secon Cyber Security is an Advanced Managed Security Services Provider with long standing experience of providing cyber security solutions to customers ranging from small to large enterprises.

Horiba Mira

Horiba Mira

Horiba Mira is a global provider of automotive engineering, research and test services including services and solutions for automotive cybersecurity.

ThreatSwitch

ThreatSwitch

ThreatSwitch a software platform for cleared federal contractors to get and stay compliant with NISPOM and Conforming Change 2.

Tactical Network Systems (TNS)

Tactical Network Systems (TNS)

Tactical Network Solutions helps you discover hidden attack vectors in IoT and connected devices before someone else does.

Trustaira

Trustaira

Trustaira is the first deep tech solution and service company in Bangladesh.

CyFlare

CyFlare

CyFlare’s security platform integrates your tools with ours – delivering true positives, automated remediation, and interactive analytics built for security management teams.

SecurWeave

SecurWeave

SecurWeave's Configurable Hardware Enforced Safety and Security (CHESS) platform has been designed to meet the security and safety criticality needs of the evolving digital industry.

Blackwired

Blackwired

Blackwired has established a new category in cyber security with an intelligence-led model based on the USMC’s Combat Hunter programme ‘Left of Bang’.

Convergint

Convergint

Convergint is a service-based systems integrator working alongside a global network of partners and manufacturers to deliver a range of solutions including cybersecurity.

Conifers.ai

Conifers.ai

Empower your existing SecOps team with the strength of AI - achieve SOC excellence with Conifers CognitiveSOC.